Juniper

Junos

720 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

J-Web does not validate certain input that may lead to cross-site request forgery (CSRF) issues or cause a denial of J-Web service (DoS).

  • EPSS 1.35%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 tra...

  • EPSS 0.08%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

Certain combinations of Junos OS CLI commands and arguments have been found to be exploitable in a way that can allow unauthorized access to the operating system. This may allow any user with permissions to run these CLI commands the ability to achie...

  • EPSS 0.33%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

Insufficient cross site scripting protection in J-Web component in Juniper Networks Junos OS may potentially allow a remote unauthenticated user to inject web script or HTML and steal sensitive data and credentials from a J-Web session and to perform...

  • EPSS 0.05%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

An incorrect permissions vulnerability in Juniper Networks Junos OS on vMX may allow local unprivileged users on a host system read access to vMX or vPFE images and obtain sensitive information contained in them such as private cryptographic keys. Th...

  • EPSS 0.39%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

Juniper Networks Junos OS 16.1R1, and services releases based off of 16.1R1, are vulnerable to the receipt of a crafted BGP Protocol Data Unit (PDU) sent directly to the router, which can cause the RPD routing process to crash and restart. Unlike BGP...

  • EPSS 0.39%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an attacker to cause a ...

  • EPSS 0.37%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

On SRX Series devices, a crafted ICMP packet embedded within a NAT64 IPv6 to IPv4 tunnel may cause the flowd process to crash. Repeated crashes of the flowd process constitutes an extended denial of service condition for the SRX Series device. This i...

  • EPSS 0.25%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated cras...

  • EPSS 0.05%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions ...